Abstract
As the demand and diversity of digital content increase, consumers now have simple and easy access to digital content through Over-the-Top (OTT) services. However, the rights of copyright holders remain unsecured due to issues with illegal copying and distribution of digital content, along with unclear practices in copyright royalty settlements and distributions. In response, this paper proposes an automated OTT service copyright distribution management system using the Open Digital Rights Language (ODRL) to safeguard the rights of copyright holders in the OTT service field. The proposed system ensures that the rights to exercise copyright transactions and agreements, such as trading of copyright, can only be carried out when all copyright holders of a single digital content agree based on the Threshold Schnorr Digital Signature. This approach takes into account multiple joint copyright holders, thereby safeguarding their rights. Furthermore, it ensures fair and transparent distribution of copyright royalties based on the ratio information outlined in ODRL. From the user’s perspective, the system not only provides services proactively based on the rights information specified in ODRL, but also employs zero-knowledge proof technology to handle sensitive information in OTT service copyright distribution, thereby addressing existing privacy concerns. This approach not only considers joint copyright holders, but also demonstrates its effectiveness in resolving prevalent issues in current OTT services, such as illegal digital content replication and distribution, and the unfair settlement and distribution of copyright royalties. Applying this proposed system to the existing OTT services and digital content market is expected to lead to the revitalization of the digital content trading market and the establishment of an OTT service environment that guarantees both vitality and reliability.
1. Introduction
Since the emergence of COVID-19, the demand for digital content has surged, invigorating the digital content market. Nonetheless, in contrast to the positive developments associated with this growth, the central stakeholders of the digital content industry, particularly the copyright holders, find themselves in a predicament where their legitimate rights are not being sufficiently safeguarded.
Spotify, a major music streaming platform, has introduced initiatives to protect the rights of music copyright holders, particularly against illegal reproduction and distribution, including stream ripping. However, these copyright holders, who use Spotify’s service, have highlighted issues with the method of royalty settlement and distribution. The root of these problems is the ‘black box’ issue, where music ownership is split among different groups, resulting in delays or non-payment of the rightful royalties to the copyright holders [1,2]. The same problem is evident in Theme/Background/Signal (TBS) music as well. In addition, the video content copyright sector is facing challenges related to copyright infringement caused by widespread account sharing, and issues arising from the lack of transparency in the settlement and distribution of royalties [3,4].
Recently in the OTT service industry, there has been a rise in illegal replication and distribution of digital video content. This is driven by practices like stream ripping, rampant password sharing among users, credential fraud, deceptive consumer endpoints, and man-in-the-middle attacks on Content Delivery Networks (CDNs). As a result, the rights that should be protected for copyright holders are increasingly being violated [5].
Furthermore, when copyright holders delegate the management of their digital content rights to agents, the opaque structure of this arrangement frequently results in their inability to clearly access information about the usage history and the status of royalty settlements and distributions for their digital content.
In order to protect the rights of copyright holders, there have been significant research and development efforts focused on creating a fair and transparent copyright management system. This involves the use of technologies like Digital Rights Management (DRM) and Blockchain.
However, a majority of these studies fail to offer dedicated solutions for safeguarding sensitive data involved in the management and distribution of digital content copyrights and in royalty settlements. This lack of protective measures poses a risk of privacy breaches and, in cases of data leaks, could lead to disputes between companies or between companies and individuals.
Digital content creation can involve just one copyright holder, but it often includes several joint copyright holders. Yet, most studies fail to investigate methods for managing royalty settlements and distributions in cases involving multiple joint copyright holders, which limits the practical application of these solutions in the industry. Moreover, while current policies and regulations demand the consent of all copyright holders for transactions involving digital content, this critical requirement is also overlooked in the study.
Consequently, the ODRL-based automated OTT service copyright management system proposed in this study not only suggests a method for settling and distributing royalties with consideration for multiple stakeholders, specifically joint copyright holders, but also provides a mechanism for these holders to express their consent effectively and logically through signatures in the event of a copyright transaction. Moreover, this system addresses the sensitive data involved in digital content distribution and royalty settlements by proposing privacy protection measures. This approach overcomes the shortcomings and limitations that current research has not yet resolved, aiming to offer a viable system for the digital content industry.
The layout of this paper is outlined as follows. In Section 2, the paper delves into the technical concepts of Hyperledger Fabric, smart contracts, and ODRL. Section 3 provides an analysis of the current Blockchain-based methods for copyright management, including royalty settlement and distribution. Section 4 elaborates on the ODRL-based automated OTT service copyright management system proposed in this study. Section 5 explains the key modules of this system. Performance analysis is conducted in Section 6 to showcase the system’s efficiency, while Section 7 explores the technical approaches and constraints associated with the proposed system. The paper is wrapped up in Section 8.
2. Background
2.1. Hyperledger Fabric
Hyperledger Fabric is a Blockchain platform designed for enterprise use. Before version 2.0, it had no concept of separate cryptocurrency and managed the nodes included in each organization independently. Since Hyperledger Fabric is an enterprise Blockchain, it employs an Membership Service Provider (MSP) to perform identity verification of nodes to participate in the Blockchain network, enabling access control and establishing accountability in case of issues. Additionally, when composing chaincode, it allows configurations based on general programming languages, ensuring versatility. It also guarantees confidentiality and privacy by allowing only the authorized peers participating in the channel to access the data [6,7,8,9,10].
As can be seen in Figure 1, various components operate organically on the Hyperledger Fabric network [6]. Table 1 below shows the main roles of components in the Hyperledger Fabric architecture [6,7,8,9,10].
Figure 1.
Architecture of Hyperledger Fabric.
Table 1.
Hyperledger Fabric architecture key Component role.
In the case of transaction processing and recording in the ledger based on the components in Figure 1, operations between components are performed as shown in Figure 2.
Figure 2.
Transaction flows in Hyperledger Fabric network.
- The client forwards the signed transaction proposal to the predefined Endorser.
- The Endorser checks whether the signature of the transaction proposal received from the client is valid, and if valid, executes the chaincode based on the parameters of the transaction proposal and delivers the transaction results (including Read set and Write set) to the client.
- The client checks whether the signature value of the returned transaction result matches the Endorser’s signature value.
- If the reliability of the transaction result returned through Process 3 is guaranteed, it is delivered to the ordering service node.
- As the ordering service node receives already verified transaction results from the client, it organizes them by channel and time to create a transaction block per channel.
- Transaction blocks per channel generated by the ordering service node are broadcast to all peer nodes on the Blockchain network.
- All peer nodes verify the validity by checking the contents of the R/W set, such as guarantee policy and ledger state changes, based on the received transaction block, and if verification is successful, they commit it to the world state.
Hyperledger Fabric is currently being employed in areas such as smart homes, healthcare, education, and digital content, and the trend shows that its application fields are gradually increasing [11,12,13,14].
2.2. Smart Contract
Blockchain technology is typically divided into public Blockchains like Bitcoin and private Blockchains like Hyperledger Fabric. As illustrated in Figure 3, such Blockchains are generally composed of six layers. This ranges from the ‘Data Layer’, which sets up the data structure including data blocks, timestamps, and other data, to the ‘Application Layer’, which enables the development of various application services based on Blockchain [15].
Figure 3.
The structure of Blockchain layers.
Within these layers of Blockchain technology, the ‘Contract Layer’ plays a pivotal role in configuring automated events in the Blockchain network. This layer, whether it is Ethereum’s smart contract or Hyperledger Fabric’s chaincode, is programmed to meet specific contract conditions, enabling the execution of user-intended events in an automated manner [15].
Smart contract development typically utilizes programming languages like Solidity and Vyper, and leverages Integrated Development Environments (IDEs) such as Remix and Truffle. For interfacing with nodes, it employs JSON-RPC. The process of creating a smart contract involves writing code, converting it into bytecode, and then distributing this bytecode across the nodes in the Blockchain network. Furthermore, a smart contract has a lifecycle that encompasses the process of accessing a deployed smart contract on the Blockchain network through calls [15,16,17,18].
In contrast, chaincode supports general-purpose programming languages such as GO and JavaScript. It is developed to meet specific user requirements using IDEs like Chaincoder and Goland [19,20,21]. For node interface communication, the gRPC method is employed. Typically, chaincode is written, compiled into an executable file, and then packaged. This packaged chaincode is then distributed to Endorser nodes participating in a channel. Accessing chaincode involves a calling process similar to that of smart contract. However, chaincode differs in that it executes by requesting a proposal, and a transaction is submitted to the Orderer only upon receiving a return value. Blocks created through this process are broadcasted to nodes within the channel via the Ordering Service. Each peer node receiving these blocks adds them and commits them to the world state, ensuring a coherent and secure transaction process.
Smart contract, utilized in public Blockchains, is distributed across all nodes, leading to a distinct approach in access control compared to chaincode. On the other hand, chaincode is only distributed to authorized nodes within a specific channel. This difference significantly impacts how access is controlled. Furthermore, the immutable nature of Ethereum, a public Blockchain, prohibits data updates, rendering smart contract updates infeasible. In contrast, Hyperledger Fabric, a private Blockchain, allows data updates and deletions, contingent on governance permissions. This flexibility enables updates in Hyperledger Fabric that are not possible in Ethereum. Table 2 provides a comparative overview of the key characteristics of smart contract and chaincode [22].
Table 2.
Comparison of smart contract and chaincode.
2.3. ODRL
With the increasing diversity of digital content and the widespread dissemination of numerous digital content, the need for a standardized management of digital rights and permissions to protect copyrights has grown. The ODRL emerged in this context, aiming to address the increasingly complex and extensive digital rights management. It allows copyright holders to precisely specify the restrictions they wish to impose on their digital content, and based on this, end-users can clearly understand the usage rights of the digital content, thereby protecting the rights of the copyright holders. The ODRL is designed to be scalable and flexible, enabling the expression of complex rights and permissions through various Classes. The main Classes of the ODRL are as shown in Table 3 [23].
Table 3.
Main classes of the ODRL.
The ODRL specifies digital asset rights in detail through these Classes. A typical ODRL Policy allows the ‘Assigner’ to provide the ‘Asset’ to the ‘Assignee’ via ‘Rule’, which can introduce more granular constraints through ‘Action’ and ‘Constraint’. Such a structured framework ensures that rights are precisely defined and applied, enabling effective management of restrictions like a copyright transfer and access limitations of digital content.
Listing 1 defines rights and restrictions related to the use of digital content based on the ODRL [23]. It indicates an agreement or contract between parties through the ‘Agreement’ subclass of the ‘Policy’ Class. This ‘Policy’ grants rights to the ‘Asset’ set as ‘http://example.com/DigitalContent:0709’, conferred by ‘http://example.com/Agent1’, designated as ‘assigner’. The rights are assigned to ‘http://example.com/Usergoup1’, designated as ‘assignee’. Through ‘PartyCollection’, it is understood that the rights are granted to a group, not just an individual. ‘PartyCollection’ allows specifying that only those meeting certain criteria, defined in ‘refinement’, receive rights. The ‘dateTime’ operand on the left signifies date and time, while ‘lteq’ represents ‘less than or equal to’, meaning the left operand’s value must be less or equal to the right operand, which represents the service expiry date. Thus, through the ‘refinement’ condition, it is discerned that ‘Usergroup1’ is a collection of ‘assignees’ with usage rights until ‘2024-07-09’. The granted rights include the ‘play’ action within the ‘Action’ Class, permitting playback of the target. The constraint on ‘Action’ includes ‘schema:age’ as the left operand, and ‘gteq’, meaning ‘greater than or equal to’. The right operand being ‘19’ indicates that the digital content playback right is granted only if the user’s age satisfies the condition of being 19 years or older. Therefore, through Listing 1’s ODRL, users in ‘UserGroup1’, grouped by the service expiry date, can play ‘http://example.com/DigitalContent:0709’ only if they are at least 19 years old.
Listing 1.
ODRL Information Model V2.2.
Listing 1.
ODRL Information Model V2.2.
![]() |
In today’s digital environment, where digital content is continuously shared and consumed across borders and platforms, the need for a standardized language of rights is more crucial than ever. In this context, the ODRL has become a key indicator, offering a consistent approach to the representation and application of digital rights.
ODRL, used for expressing digital rights, permissions, and obligations, is widely utilized in various fields beyond the digital environment due to its standardized format.
Firstly, ODRL is being employed in the mobility data space as a means to protect user privacy. Mobility data encompasses all data generated by modes of transport and services, as well as by drivers, and while it offers efficiency to users, it also poses privacy risks [24]. To address this, research is underway to protect sensitive mobility data and to safely exchange it by establishing and formalizing policies through the standardized language of ODRL [25].
Additionally, fashion brands delivering products to customers via the internet, in compliance with the General Data Protection Regulation (GDPR) since May 2018, are looking to use ODRL to build an automated compliance check approach. This aims to overcome the limitations of privacy policies applied in formats unrecognized by computers, by automating the search and monitoring of policies applied through ODRL, thereby more effectively protecting customer privacy in the digital transformation of fashion brands [26].
In an era where personal data protection is a major topic of discussion, ODRL is being actively used in a multitude of research projects aimed at privacy preservation. Furthermore, it is being extensively researched and developed across a range of different domains, emphasizing its vital role in the ongoing discourse on privacy and data protection.
3. Preliminaries
Since COVID-19, there has been an increase in the consumption of digital content, leading to a more active digital content market. However, with this growth, illegal distributors are replicating and distributing digital content unlawfully, infringing on the rights that should be protected for copyright holders.
As a result, extensive study and development are being conducted to ensure the rights of copyright holders, focusing not only on means of protection, but also on strategies to safeguard sensitive data related to digital content copyrights. Furthermore, continuous monitoring is necessary to detect illegal replication and distribution of digital content. Given the limitations of the human effort in such activities, there is a growing need for automated and proactive copyright management systems. Table 4 presents the copyright distribution management systems that have been researched and developed so far to address these requirements. Table 4, the symbol ‘O’ indicates that the system proposed in the paper provides the respective functionality, ‘X’ denotes the absence of that functionality, and ‘’ signifies that only a part of the functionality is offered.
Table 4.
Study trends on Blockchain-based digital content distribution management methods.
In this regard, A. Kim and M. Kim [1] proposed a Blockchain and smart contract-based music content distribution management system. This system allows for transparent verification of transaction information and copyright data related to music content. It is built on the immutable and transparent characteristics of Blockchain, automating a series of processes based on smart contract. Additionally, they presented a model for representing music content, thereby proposing a way to manage large volumes of music content.
C.-J. Choi et al. [27] noted the limitations in the settlement and distribution of digital content royalties in the current digital content distribution environment. They aimed to improve these limitations by utilizing Blockchain technology. Additionally, they discussed the challenges in proactive integration between Blockchain networks and external systems. To address this, they proposed a Blockchain-based native currency transfer system with scheduled transfer transactions, ensuring reliability. This system, using a single transaction for automated services, overcomes performance limitations that most Blockchain-based royalty settlement and distribution systems could not solve, thus constituting an efficient system.
Zheng, Xinyu et al. [28] observed the rapid growth of the short film industry, alongside the continuous occurrence of copyright infringement issues. In response, they proposed a Blockchain NFT-based short film copyright transaction system. In this system, when a copyright transaction occurs, the transfer of copyright takes place transparently based on account information in the Blockchain environment. Furthermore, the system facilitates the settlement and distribution of royalties within the Blockchain context. A distinctive feature of this system is its rights protection functionality; if users identify copyright infringement cases, they can collect evidence through a dedicated application. For the first reporter, incentives are issued in the form of tokens, setting this system apart from others.
Varaprasada Rao, K. et al. [29] note that with the digitization of content, illegal replication and distribution have become more effortless, leading to a rapid increase in copyright infringement issues. They also highlighted the limitations of current digital content copyright management models, proposing a Blockchain-based copyright protection system to address these shortcomings. This system allows for the registration of digital content information on the Blockchain via smart contract, ensuring smooth transfer of copyrights during transactions.
Li, Jun et al. [30] analyzed that with the spread of digital content, from a copyright holder’s perspective, there is a need for platforms to upload and host digital content online, and from a consumer’s perspective, platforms are needed to pay for and download digital content online. Consequently, they developed and introduced LBRY, a Blockchain-based decentralized digital content market. This system anonymizes the identity of copyright holders who publish digital content, thereby preventing the disclosure of the actual identity and protecting against privacy infringement issues. This feature marks a significant distinction from other study and development trends.
Y. Kim et al. [31] discussed the limitations in the current Theme/Background/Signal (TBS) music domain. Firstly, they noted the difficulty in tracking rights changes due to the frequent alterations inherent in TBS music. Secondly, they identified the risk of unfair and unclear royalty settlements and distributions due to complex licensing methods (e.g., compensation payment methods, usage fee payment methods, comprehensive settlement methods, volumetric settlement methods) and centralized royalty management. To address these issues, they proposed a Blockchain-based TBS music distribution system aimed at improving the unreasonable royalty settlement and distribution practices of the existing TBS music system. While traditional settlement and distribution relied on pre-agreed amounts, proving to be unfair, their proposed system generates usage records through monitoring [4] and bases royalty distributions on the frequency of use. However, as usage records generated through monitoring could contain sensitive information not meant for public disclosure, they utilized selective disclosure technology to ensure that only authorized stakeholders could access sensitive information while keeping it concealed from general users [3,32].
As evident from Table 4, although most studies provide copyright management functionalities, they primarily exhibit limitations in the following four aspects.
- (1)
- Lack of privacy protection measures for sensitive data related to digital content copyright (e.g., information on copyright holders, sales proceeds, etc.).
- (2)
- Absence of smart contract signing approach that considers multiple stakeholders.
- (3)
- Lack of a fair and transparent mechanism for the settlement and distribution of digital content royalties.
- (4)
- Absence of a method to verify users’ rights to access digital content.
Digital content copyright data can include sensitive information such as the copyright holder’s details, usage fees, or sales/contract information of digital content. Since the system operates on the Blockchain, all nodes participating in the Blockchain network, even those who are not actual stakeholders, can access this sensitive data. This poses a risk of privacy infringement, and with the growing focus on data privacy, it is imperative to explore measures to protect such information.
For digital content copyright transactions to occur, consent from all copyright holders is required. Therefore, for the management of settlement and distribution of royalties via smart contract, it is essential to consider multiple stakeholders, especially in cases of joint copyright holders. Correspondingly, an approach for smart contract signing must be explored. However, most studies have focused only on a single copyright holder and have not separately addressed smart contract solutions for multiple stakeholders, which is a limitation.
One of the biggest issues in the digital content field is the unfair and unclear settlement and distribution of copyright royalties. Currently, royalties are settled and distributed based on the set prices of specific digital content, with most being collected and distributed by trust management organizations. Consequently, copyright holders are unable to verify the exact amount of royalties due for their works. Therefore, a fair and transparent mechanism for royalty settlement and distribution is essential. However, some studies still fail to consider this issue.
Furthermore, from the perspective of digital content distribution management, it is crucial to have a method that proactively verifies a user’s rights to access the digital content. However, most studies proposing digital content distribution management solutions tend to omit the process of verifying user access rights, presenting a limitation in their applicability to real-world industrial environments.
4. Proposed System
This section outlines the automated OTT service copyright distribution management system utilizing the ODRL. The existing system demonstrated a significant drawback: it overlooked the presence of multiple joint copyright holders in a single piece of digital content and did not adequately address the settlement and distribution of copyright royalties or the proactive provision of rights from the consumer perspective. Moreover, the distribution of OTT service copyrights, compounded by the reliance on Blockchain technology, raised ongoing privacy concerns due to the lack of protective measures for sensitive information. The proposed system addresses these issues by enabling multiple joint copyright holders of a single digital content piece to actively engage in OTT service distribution through direct signatures, thereby ensuring a logical and equitable distribution process. Copyright royalties are allocated fairly and transparently, based on the ratios outlined in the ODRL. Furthermore, the system enhances consumer convenience by proactively offering services based on digital content usage rights as specified in the ODRL. To safeguard privacy, particularly concerning sensitive data like social security numbers, the system employs zero-knowledge proof range proof techniques, verifying individuals as over 19 years old without exposing private information [33].
Accordingly, the main goals and contributions of the system proposed in this paper can be as follows.
- (1)
- The proposed system employs zero-knowledge proofs to safeguard sensitive information in digital content transactions, effectively preventing privacy infringements.
- (2)
- The proposed system ensures the distribution of digital content is based on the signatures of all joint copyright holders, taking into account multiple joint copyright holders.
- (3)
- The proposed system automatically verifies the usage rights of consumers as stated in the ODRL and provides digital content accordingly.
- (4)
- The proposed system automatically extracts information related to copyright royalties distribution from the ODRL and performs settlement and distribution of copyright royalties, considering the joint copyright holders.
To achieve these objectives, this paper proposes the automated OTT service copyright distribution management system utilizing the ODRL, with the system architecture as illustrated in Figure 4. Additionally, Table 5 shows the notation defined to explain the more detailed operation process of the proposed system shown in Figure 4. In the proposed system, the ODRL, a standardized policy expression language, is employed to transparently and efficiently manage the settlement and distribution of and related usage constraints.
Figure 4.
Proposed automated OTT service copyright distribution management system using the ODRL.
Table 5.
Notations.
The operation of the proposed system in this paper is based on the following two assumptions.
- (1)
- It is assumed that when A creates , A submit metadata, which includes information about among copyright holders, to in each country.
- (2)
- Assuming that has received from the process outlined in Assumption (1), it is assumed that they have verified this . Once verification is complete, they are presumed to have issued and based on the received Metadata to A.
In relation to Assumption (2), once completes the verification of , it searches and queries A’s information based on the records in Hyperledger Fabric to verify if A has been previously registered. If A has no prior registration record, a new ODRL code is issued following the same process as earlier. However, if A is a digital content production and entertainment company like the ‘Walt Disney Company’, with a history of registration, the ODRL information of that A is parsed. Subsequently, new metadata related to the (e.g., , copyright holder information, ) is added to the existing . This enables O to contract with the digital content production company using a single ODRL, making the contracting process more efficient. The system proposed in this paper operates based on three phases: ‘Register’, ‘Usage’, ‘Settlement/Distribution’, and the key processes of these are as follows.
- (1)
- Register Phase: Through a with O, A registers their on the InterPlanetary File System (IPFS).
- (2)
- Usage Phase: wishing to access on O pay a . This establishes ’ to use the , resulting in the being specifically provided to these in alignment with their established .
- (3)
- Settlement/Distribution Phase: A transparent and fair settlement and distribution of are performed based on the paid by numerous .
4.1. Register Phase
Figure 5 depicts the procedure of A registering their created on IPFS, facilitated by a contractual agreement with O. The specific steps involved in this operation are detailed as follows.
Figure 5.
The process of the Register phase.
- (1)
- O delivers a to A who owns the copyright for the to be registered in its service.
- (2)
- A delivers the issued from to along with the delivered .
- (3)
- , upon receiving the , extracts from its contents, applicable when A is composed of multiple copyright holders.
- (4)
- proceeds to update the by incorporating the obtained in Step (3).
- (5)
- Following this, extracts the , , , and from the updated as per Step (4).
- (6)
- sends the extracted , , , and to A as derived in Step (5).
- (7)
- requests a from A.
- (8)
- Copyright holders within A, in agreement with the information extracted in Step (5), proceed to sign, thereby sending back a as a response.
- (9)
- aggregates the received in Step (8). Once all copyright holders have signed, a single signature value is derived.
- (10)
- then verifies the validity of the generated in Step (9).
- (11)
- Upon verifying the in Step (10) and confirming the consensus of all copyright holders on the terms, sends the and the to . Additionally, A forwards the , received from , to O’s .
- (12)
- creates the by adding and updating the received in Step (11) to the .
- (13)
- then sends the to .
- (14)
- extracts from the , which is used to verify in O.
- (15)
- sends the extracted to O’s .
- (16)
- compares the information in the received from A in Step (11) with the received from in Step (15).
- (17)
- of O, through Step (16), verifies the match of information and then sends to .
- (18)
- Upon receiving from , which confirms the validation of the in Step (17), requests from A.
- (19)
- A, upon receiving a request for from within O, sends the and to IPFS.
- (20)
- IPFS divides the received from A into smaller fragments to create .
- (21)
- A unique is generated for the created .
- (22)
- IPFS registers the created in Step (20) and the generated in Step (21) within the IPFS network, thereby forming a distributed file system.
- (23)
- IPFS sends a to A, indicating the completion of the registration.
- (24)
- IPFS sends the to Hyperledger Fabric.
- (25)
- Hyperledger Fabric stores the received through process (24) in its ledger.
- (26)
- Hyperledger Fabric then sends the stored to .
- (27)
- adds the received in Step (26) to the , creating an .
- (28)
- forwards the , created in Step (27), to .
For the in the ‘Asset’ Class of ODRL, a unique identifier such as an International Standard Book Number (ISBN) is used in the uid to distinctly identify the . Concurrently, for the to be stored, as outlined in Step (25), it is stored in ‘source’ since it denotes the location or origin of the . The is thus added to ‘source’, indicating the storage location of the . Following the storage of , automated delivery can be executed in the ‘Usage’ phase, utilizing the as requested by C.
4.2. Usage Phase
Figure 6 explains the ‘Usage’ phase, where O provides access to who wish to use the available on O. This process assumes a scenario where a new C who has not paid the for O wants to use it.
Figure 6.
The process of the Usage phase.
C desiring to use O creates their by completing the membership registration process. During this, C enters their personal identity information, such as a social security number, into O. O then verifies the provided identity information by comparing it with the identification documents. Upon successful verification, O performs a zero-knowledge proof to determine if C is over 19 years old, based on the verified identity information, and stores the generated proof value in the information. Zero-knowledge proof is a cryptographic theory that verifies a fact using only the truth or false of a proposition without revealing any information about the proposition itself [13]. In the proposed system, running in the Hyperledger Fabric environment, using personal information directly in the system without privacy-enhancing technologies can lead to the storage of personal information in a distributed ledger, potentially breaching confidentiality and privacy regarding C identity. To solve this problem, the system employs zero-knowledge proofs to ensure the confidentiality and privacy of by verifying only whether they meet the conditions for using , without storing personal information on the Blockchain.
- (1)
- C requests playback of the they wish to use through O that owns the .
- (2)
- O sends the of C who requested the playback to .
- (3)
- queries the based on the in Hyperledger Fabric.
- (4)
- Hyperledger Fabric returns the corresponding to the to .
- (5)
- checks the received in Step (4).
- (6)
- , based on the checked in Step (5), verifies that C has not made a payment and sends to O.
- (7)
- O, upon confirming that C has not made the required for using O, provides C with limited playback of along with .
- (8)
- C sends , corresponding to their desired rate plan, to , along with their .
- (9)
- stores in the .
- (10)
- then sends the updated to as per Step (9).
- (11)
- determines the specific rate plan corresponding to the payment made, as indicated by the in the received , and confirms the associated .
- (12)
- Following this, sends the , along with the confirmedfrom Step (11), to .
- (13)
- creates based on the and .
- (14)
- then sends the to .
- (15)
- who have gained for the registered on O re-request the playback of their selected from O.
- (16)
- O sends the details to .
- (17)
- retrieves the from Hyperledger Fabric, using theinformation as a reference.
- (18)
- Hyperledger Fabric provides with the associated with the .
- (19)
- then sends the of C, who has requested playback, to O.
- (20)
- After verifying that C who requested playback has completed the payment, O sends both the and the requested by C to .
- (21)
- checks C’s based on the received from during Step (14).
- (22)
- Once confirms that the specific C has gained for the , it sends the and details to Hyperledger Fabric.
- (23)
- Hyperledger Fabric, upon receiving the , instructs IPFS to send the , which matches the , to C associated with .
- (24)
- Following this request, IPFS delivers the specified to C.
- (25)
- After providing the , IPFS sends the , detailing the delivered, back to Hyperledger Fabric.
- (26)
- Hyperledger Fabric then increments the count by one, based on the it received.
Through the ‘Usage’ phase, gain the for to access by paying for O. The sequence of actions take to engage with is documented in Hyperledger Fabric, where the usage history of each item is also stored. As described in Section 4.3, the ‘Settlement/Distribution’ Phase aims to protect the rights of copyright holders. This is achieved through a transparent process of settling and distributing , which is based on the payments made by during the ‘Usage’ phase and the recorded usage history of the .
4.3. Settlement/Distribution Phase
Through the previously described ‘Register’ and ‘Usage’ phases, O collects from a large number of . In the concluding ‘Settlement/Distribution’ phase, there is a process of transparent and equitable settlement and distribution of the , which are based on the cumulative usage fees of O. Figure 7 illustrates this ‘Settlement/Distribution’ phase. It demonstrates how transparent settlement and distribution of are conducted among various copyright holders, as well as between A comprising multiple copyright holders and O. This process is grounded in the that pay to access O. The detailed operational procedure is outlined as follows.
Figure 7.
The process of the Settlement/Distribution phase.
- (1)
- In the ‘Register’ phase as described earlier, , after receiving from in Step (28), extracts and sends it to . Additionally, it sends and to .
- (2)
- queries Hyperledger Fabric for .
- (3)
- Hyperledger Fabric returns to .
- (4)
- calculates by multiplying the , received from in Step (1), with the obtained from Hyperledger Fabric in Step (3).
- (5)
- then sends the calculated to .
- (6)
- sends the , received from in Step (5), along with and , received from in Step (1), to the Payment Gateway.
- (7)
- The Payment Gateway, based on the received and , allocates to A and to O.
- (8)
- Finally, the Payment Gateway sends the allocated amounts to A and to O, as distributed in Step (7).
Through this process, the automated OTT Service copyright management system utilizing the ODRL can protect the privacy of sensitive data related to copyrights. By executing based on the signatures of all copyright holders, considering multiple stakeholders, the system ensures the protection of authors’ rights. Additionally, it automatically verifies ’ to provide . By taking into account joint copyright holders, the system transparently and fairly settles and distributes . This ensures that copyright holders not only have their rights secured, but also receive fair royalties proportionate to their contributions.
Additionally, many copyright holders currently aim to manage and protect their copyrights effectively through copyright trust management organizations. However, due to inadequate regulations governing the legal relationship between these organizations and the copyright holders, they are often constrained to adhere to the established by the trust management organizations. This limitation leads to a challenge for copyright holders in transparently verifying their earnings from these organizations. The proposed system addresses this issue by enabling copyright holders to express their views and enter into based on their signatures concerning the and of proposed by O. Furthermore, the system guarantees copyright protection by distributing according to ’ to use this . Consequently, this approach simplifies the transaction process by eliminating the need for intermediaries like copyright trust management organizations. By reducing agency fees, it ensures that copyright holders receive greater profits and better protection of their rights.
5. Main Modules
In the automated OTT service copyright distribution management system utilizing the ODRL, it has been demonstrated that four key goals can be accomplished through the ‘Register’, ‘Usage’, and ‘Settlement/Distribution’ phases. To realize the second goal—ensuring the distribution of is based on the collective signatures of all copyright holders, especially in cases involving multiple joint copyright holders — is critical. Additionally, plays a vital role in achieving the third goal of providing by automatically verifying ’ using the information encoded in . This module also contributes to the fourth goal of efficiently managing the settlement and distribution of , taking into account joint copyright holders. Therefore, by detailing the operational processes of these two essential modules, the system vividly illustrates their specific functions and roles.
5.1. Agreement Module
In scenarios involving multiple copyright holders, , responsible for verifying the signatures of all copyright holders, is depicted in Figure 8.
Figure 8.
Architecture of the Agreement module.
As for the system proposed in this paper, it eliminates the need for an intermediary, such as a trust management organization. Therefore, the term ‘A’ is applicable to either an individual or a collective of multiple copyright holders. In situations where A comprises several copyright holders, employs the Threshold Signature Scheme (TSS) to ensure the protection of copyrights for all involved copyright holders.
The TSS refers to a technology where a single digital signature is generated when a designated threshold number t of participants out of n, each perform a partial signature using their private keys. The TSS process is executed as follows [34].
- Using a threshold key generation algorithm, a key pair (P, V) is produced. The set S={,,⋯,} represents a collection of ‘shared secret keys’, designed to split the secret key into n parts for distribution among multiple participants involved in the signing. The public key, P, is utilized for verifying the generated signature, and a verification key, V, is also created to validate the shared values of the signature.
- Each participant generates a signature share value, , using their individual shared secret key and the message m.
- The signature share value for each participant is verified through P and V.
- The single signature value is formed by combining a set of t verified signature share values {, , ⋯, }, in accordance with the previously established threshold t.
- Using the P, is then utilized to validate the signature corresponding to m.
Therefore, to ensure that is established only when all copyright holders agree on terms, the TSS with a threshold value equal to the number of copyright holders n is used to guarantee their rights. Typically, in copyright transactions, the agreement of all joint copyright holders or stakeholders is required. Accordingly, by considering multiple joint copyright holders, , which facilitates copyright transactions based on signatures, aims to align with current copyright transaction trends. For the keys used in the TSS in , it is assumed that they have been distributed in advance.
A, upon receiving the terms from O, forwards them to along with their own . If identifies, based on the , that A is composed of multiple copyright holders, it utilizes the Ratio Extraction Module to extract data concerning the . These data are then relayed to the Contract Update Module, which integrates it into the existing terms to encompass aspects of . Subsequently, the Data Extraction Module is employed to extract and compile information that will be sent back to A. This step is crucial for communicating the terms to all copyright holders involved. The specifics of the information to be extracted are outlined in Table 6.
Table 6.
Information extracted by the Data Extraction Module and passed to A.
The Signature Aggregation Module, upon receiving the information, sends it to all the copyright holders within A. Those who agree with the terms of the use their ‘shared secret key ()’ to generate their part of the signature, known as the signature share value . If they disagree, they abstain from signing. The Signature Aggregation Module then collects all the signature share values received within a predetermined timeframe. If every copyright holder signs, thereby meeting the pre-established threshold, a unified signature value is formed. This value undergoes verification by the Digital Signature Verification Module. Once the verification process is successfully completed, the Digital Signature Verification Module informs that all copyright holders have agreed to the terms of the .
If the single signature value is not obtained due to some copyright holders refraining from signing, this situation is reported to the Condition Suggestion Module as an inability to fulfill the . In this module, all the copyright holders comprising A are queried about proposing new terms. If A decides to propose new terms, these are then communicated to O. In turn, O presents these new terms to A, facilitating a number of request and response cycles as initially determined. For instance, if the maximum number of attempts for requests and responses is established at five, and if an agreement or new terms are not reached within these five cycles, the Condition Suggestion Module informs both A and O that the has expired. Consequently, no further requests or responses for the will take place.
Under the approach described earlier, a concerning is executed only if all copyright holders concur with its terms. This ensures that copyright holders can ascertain precisely the percentage of royalties they are entitled to receive. Consequently, this facilitates a transparent process for the settlement and distribution of among the copyright holders.
5.2. ODRL Transfer Module
, used for automation by converting containing settlement, distribution, and restrictions on into a format usable in chaincode, can be seen in Figure 9.
Figure 9.
Architecture of the ODRL Transfer Module.
In the proposed automated OTT service copyright distribution management system utilizing the ODRL, there exists an generated based on the contract between A, composed of multiple or individual copyright holders, and O. Additionally, an is also created for the between O and C, based on the amount paid by C, outlining C’s for the .
For the generated between A and O, it is created based on the terms between them. It includes the , , , and of created by A. In the case of the generated between O and C, it is the ODRL that includes information about C’s to use based on the selected and paid , encompassing the specific for each C.
In the automated OTT service copyright distribution management system utilizing the ODRL, when these two types of ODRL are generated, they are sent to . This process transforms the written in ODRL into a format usable in chaincode, thereby enabling automatic execution of distribution between copyright holders, between A and O, and the control of ’ access to .
Initially, when two ODRLs are introduced into , its Object Generation Module undertakes the task of objectifying these ODRLs based on their principal Classes. When adapting the ODRL for use within chaincode, inefficiency and complexity issues may occur. These problems stem from the disparity between the chaincode’s operational environment and the varied, intricate rights expressions that ODRL is designed to handle. To address these challenges and ensure uniform processing, objectification is essential. In addition, for this module, objectification is required to determine which ‘UserGroup’ the C, who needs to provide , belongs to. This determination is based on the and provided. Such a process is also essential for efficiently locating the of the being searched for.
When C expresses the desire to access specific within O and makes a request for it, O transmits the along with the requesting C’s to . The Consumer-OTT Service ODRL Processing Module then, utilizing the provided information, identifies the UserGroup C belongs to. A UserGroup is a collective of who share the same expiry date, determined by when they paid for their OTT Service plan. This group is effectively represented by grouping various via the ‘PartyCollection’, a subset of the ‘Party’ Class, which is one of the ODRL’s main Classes.
The Consumer-OTT Service ODRL Processing Module locates the UserGroup that includes C who requested the and parses its information. It then compares the constraints listed in the UserGroup information with the received Consumer information and the to be accessed, to verify if C has to use the .
The first constraint to be verified is whether C’s O subscription has expired. If it is confirmed that the expiration date has not passed, the module then checks if C’s age meets the age restrictions for the . This verification is performed using a zero-knowledge proof created when C registered for O. For instance, if the requires C to be over 19 years old, the zero-knowledge proof will yield a true (T) result for above 19 and false (F) for those below. If both the expiry date and age constraint are satisfied, resulting in a T outcome, the Consumer-OTT Service ODRL Processing Module then forwards the to the Agent-OTT Service ODRL Processing Module. However, if any constraint is not met, the Alert Module is informed about the unfulfilled , indicating the requirements needed to access the .
Once the Consumer-OTT Service ODRL Processing Module confirms that C has met all usage constraints specified in the ODRL, it provides the requested to the Agent-OTT Service ODRL Processing Module. This module’s Hash Extraction Module extracts the of the based on the information received and transmits it to Hyperledger Fabric, enabling the delivery of the corresponding from IPFS to C.
The created through the contract between A and O contains information about settlement and distribution. Based on the received , the Agent-OTT Service ODRL Processing Module conducts a search and retrieval process. Upon finding the desired , the module sends the of that to , and the extracted , to , ensuring fair settlement and distribution.
Through , the of for Content are verified, and is automatically provided to who meet all constraints. Moreover, by automating the processes related to fair settlement and distribution of based on the and , written in the ODRL, efficient and transparent management of distribution can be achieved.
6. Analysis
In this section, we conduct a performance analysis of the consent verification method of the proposed automated OTT service distribution management system using the ODRL. Additionally, we perform a comparative analysis of its functionalities against existing digital content distribution management systems.
6.1. Performance Analysis
In this section, we undertake a thorough comparison and analysis of the TSS and conventional digital signature techniques utilized within our proposed system to confirm the agreement of all copyright holders participating in a contract. The signature techniques for comparison are Threshold Schnorr and Schnorr Digital Signatures. We intend to compare and analyze the computational load using the Square-and-Multiply algorithm for both digital signature methods. The automated OTT service copyright distribution management system using the ODRL, as proposed, is designed for managing the distribution of copyrights in digital content like OTT service. This system encompasses numerous copyright holders and users, necessitating the adoption of technologies that mirror the digital content market’s dynamics. A key aspect of the system, as discussed in this paper, is its reliance on a digital signature algorithm to ascertain the consent of copyright holders. Therefore, in this section, we plan to evaluate the overhead, safety, and efficiency by analyzing each digital signature algorithm’s performance based on computational load. This analysis takes into account that the proposed system operates on Hyperledger Fabric, a private Blockchain platform.
The Square-and-Multiply algorithm, employed for determining the computational workload, is a method for efficiently computing large numbers. It holds a significant role in cryptography, leveraging the properties of modulo. The execution process of this algorithm, when calculating N, is consistent with the steps described in Algorithm 1 [35].
| Algorithm 1 Square-and-Multiply. |
Require: and
|
In this algorithm, the exponent of the equation to be calculated is first converted into binary. Then, moving from left to right across the exponent’s bits, a squaring operation is performed for each bit, and multiplication is carried out when a bit is 1.
Initially, for the Schnorr Digital Signature method, we aim to derive the computational costs needed to obtain the signature value and to perform signature verification using the Square-and-Multiply algorithm. The process for the Schnorr Digital Signature is conducted as follows [36,37].
- (1)
- The Key Authentication Center (KAC) selects two random prime numbers, and , and identifies an element g with order q.
- (2)
- The user establishes a private key by choosing a random number s from .
- (3)
- The public key V is derived by calculating p.
- (4)
- For creating a signature for the message M, the signer selects a random number r from and computes p.
- (5)
- Using the one-way hash function , the value is calculated, followed by q, using the derived e value.
- (6)
- The derived signature values from Step (5) are transmitted to the verifier.
- (7)
- The verifier conducts signature verification by calculating p with the received signature values .
Table 7 presents the computed workload for the Schnorr Digital Signature method, calculated using the Square-and-Multiply algorithm. This calculation is premised on the assumption that k acts as a security parameter relative to the magnitude of q, leading to the derived computational requirements for the Schnorr Digital Signature.
Table 7.
Computational costs for each step in Schnorr Digital Signature.
For Steps (3) and (4) of the Schnorr Digital Signature process, the exponents s and r, used in the calculations, belong to and thus have a bit length set by the bit size k of q. Consequently, both steps involve squaring operations and an average of multiplication operations, resulting in a computational load of for these steps. In Step (5), only one multiplication is required to calculate q, and for Step (7), the same cost of computation as analyzed in [37] for the verification process of the Threshold Schnorr Digital Signature, is derived.
Next, we delve into the Threshold Schnorr Digital Signature, which is an extension of the Schnorr Digital Signature technique. This signature method involves n signing participants, with a set threshold value of t. Each participant is denoted as for . The parameters p, q, and g are chosen and established under the same criteria as the previously described Schnorr technique. The specific steps involved in these processes are as follows [37].
- (1)
- The signing participant selects a random number s from as their private key and derives the public key V by calculating p.
- (2)
- A trustworthy dealer chooses a secret polynomial q and distributes to each participant . Here, is a public value, while , calculated based on it, is a secret value.
- (3)
- Participant computes the secret value q. is the Lagrange coefficient q, leading to q.
- (4)
- The dealer selects a secret polynomial q, satisfying and , and then distributes to each participant . Here, r is a secret entrusted value meeting . is a public value, and the computed is a secret value sent to .
- (5)
- Signing participant calculates the secret value q, and the total trust value r is then computed as q.
- (6)
- The signature aggregator broadcasts the message M to be signed to all signing participants. Any participant in the signature process can assume the role of the signature aggregator.
- (7)
- Each signing participant computes their partial commitment value, p, and then broadcasts it.
- (8)
- Signatory participant selects t values from , calculates and q, and sends the resulting pair to the signature aggregator.
- (9)
- The signature aggregator compiles the final signature value by processing the t partial signatures with the same e value.
- (10)
- The verifier conducts signature verification using the received signature value , following the same method as the Schnorr Digital Signature, by calculating p.
The Threshold Schnorr Digital Signature employs the same Square-and-Multiply algorithm as the Schnorr Digital Signature previously mentioned. By considering k as a security parameter in relation to the size of q, the calculation required for this specific signature method is determined. The computational details for each step of this signature process are outlined in Table 8.
Table 8.
Computational costs for each step in Threshold Schnorr Digital Signature.
In this paper, the proposed automated OTT service copyright distribution management system using the ODRL stipulates that copyright distribution transactions proceed only when all copyright holders have signed. Consequently, for the computational requirements of generating and verifying Threshold Schnorr Digital Signature, the threshold has been set equal to the number of signatory participants, denoted as n.
In Steps (1) and (7), D.H. Nyang’s work [37] was found to have errors in the computational estimations for signature generation using the Square-and-Multiply algorithm. These errors were corrected, leading to accurate recalculations of the computational load for these steps. The values for Steps (2), (3), (4), (5), and (10) were based on the ‘Schnorr Digital Signature-based Threshold Signature Technique’ analysis, as proposed by D.H. Nyang in [37]. In Step (8), there are a total of n multiplications executed, comprising of multiplications to calculate and an additional single multiplication for q. For Step (9), which involves combining partial signatures into a single signature, only addition is used, resulting in a multiplication workload of zero in the Square-and-Multiply algorithm.
Building upon the previously derived computational loads for each step of the Schnorr Digital Signature and Threshold Schnorr Digital Signature, this study aims to compare and analyze the computational demands of these two digital signature methods. This comparison and analysis will focus on the aspects of signature generation and the verification of the resultant signature values. In terms of signature generation, unlike the Schnorr Digital Signature where each participant independently derives a signature value using their private and public keys, the Threshold Schnorr Digital Signature process involves each participant combining shared signature values, derived using their private and public keys, to produce a single signature value. Derived from the data in Table 7 and Table 8, the computed costs for signature generation and verification in the Schnorr Digital Signature and Threshold Schnorr Digital Signature are presented in Table 9.
Table 9.
Computation costs of Schnorr Digital Signature and Threshold Schnorr Digital Signature.
For the Schnorr Digital Signature, the computational costs per process as shown in Table 7 are based on a scenario with a single signer. To facilitate a clear comparison with the Threshold Schnorr Digital Signature, it is essential to adjust this to a scenario with n signatory participants. Thus, the computational costs listed in Table 9 were derived by multiplying the costs from Table 7 by n.
Initially, based on Table 9, we aim to compare and analyze both digital signature techniques from the perspective of signature generation, with n signing participants. It is evident that the Threshold Schnorr Digital Signature, with the threshold set to n, the same as the number of signing participants, requires more computational load compared to the Schnorr Digital Signature. This is analyzed to be due to the need to derive shared signature values using secret values and entrusted values for the use of the TSS, unlike typical digital signatures. Moreover, the process of combining the derived shared signatures to produce a single key is carried out through addition, which is not included in the computational load derived through the Square-and-Multiply algorithm. Therefore, when considering these additional calculations, it is discerned that a higher computational load is required.
From the perspective of signature verification, it is noted that the Threshold Schnorr Digital Signature requires n times less computational load than the Schnorr Digital Signature. This is attributed to the fact that while the Schnorr Digital Signature requires the verification of each participant’s signature value, the Threshold Schnorr Digital Signature performs verification on a single, combined signature value derived from the shared signatures.
In the system proposed in this paper, which is based on Threshold Schnorr Digital Signature, contracts are processed by obtaining signatures from copyright holders within the Agent. While this may lead to some overhead in signature generation compared to traditional Schnorr Digital Signatures, it shows efficiency in processing time during signature verification. Notably, with multiple copyright holders within an Agent, the system’s verification time becomes more efficient by a factor of n, especially as the number of copyright holders increases.
However, in the system proposed in this paper, since both signature generation and verification processes are implemented, we aim to compare the total computational workload of the two signature techniques, Schnorr Digital Signature and Threshold Schnorr Digital Signature. The total computational requirement needed for these two signature techniques is calculated by adding the costs required for signature generation and verification, as outlined in Table 9 for each technique. Accordingly, the Schnorr Digital Signature requires a computational workload of , while the Threshold Schnorr Digital Signature requires . This relationship can be seen in Figure 10, where the x-axis represents the bit size of the private key, the y-axis represents the number of signatories, and the z-axis signifies the computational requirement.
Figure 10.
Total computational costs graph of Schnorr Digital Signature and Threshold Schnorr Digital Signature.
In the formulas representing the total computational requirements for the two signature techniques, the variable n signifies the number of signing participants, and k denotes a security parameter related to the size of q. Considering the assumption that the prime number q is at least , it is inferred that k is 107 or more. Since both n and k are variables in the formulas that quantify the total computational requirements of these signature methods, to determine the optimal state of the signature technique used in this system, a graph was created in a three-dimensional space. This graph illustrates the total computational requirements, taking into account both variables.
Upon analyzing the two graphs, it has been confirmed that when n exceeds 1 but remains below 4, the computational workload for the Threshold Schnorr Digital Signature, as utilized in the system proposed in this paper, is lower than that of the Schnorr Digital Signature. Consequently, when assessing whether all authors agree to the contract terms using the Threshold Schnorr Digital Signature, particularly in the case of an agent composed of two or three authors, it has been observed that all authors can be identified more quickly than when employing the Schnorr Digital Signature. This discovery implies the potential for establishing a more efficient digital content distribution and management system by obtaining consent to the contract terms from all parties involved.
Furthermore, in terms of system security, traditional Schnorr Digital Signatures require regenerating and reverifying the signature if a private key is lost during verification. However, with the Threshold Schnorr technique, the policy allows contracts to proceed if t out of n copyright holders sign. For example, in a situation where five copyright holders have interests in a single piece of content, a contract can be executed with the signatures of three copyright holders, as per system policy. This ensures stable system operation even if two holders lose their shared key value, as the contract can still be executed with the remaining three signatories.
However, in the context of the system proposed in this paper, there is no advantage in terms of system stability because transactions are executed solely upon the signed consent of all copyright holders associated with each digital content, following legal requirements for copyright transactions. Nevertheless, there is a time efficiency advantage in the case of digital content transaction contracts involving agents consisting of two or three copyright holders who establish interests in specific digital content. This advantage stems from the swift signature and verification speeds facilitated by the characteristics of digital signatures.
6.2. Functional Analysis
In this section, we analyze the automated OTT service distribution management system using the ODRL proposed in this paper by comparing it with the functions of the system proposed in the previous study analyzed in Section 3. This analysis can be seen in Table 10. Table 10, the symbol ‘O’ indicates that the system proposed in the paper provides the respective functionality, ‘X’ denotes the absence of that functionality, and ‘’ signifies that only a part of the functionality is offered.
Table 10.
Comparative analysis of functions between previous study and the proposed system.
As analyzed in Section 3, the systems proposed in most studies provide major functions for the purpose of copyright distribution management, but there was a limitation in that they did not design features like ‘smart contract signing function’, ‘copyright royalties settlement and distribution function’, ‘privacy protection function’, and ‘user permission check function’.
Accordingly, this paper proposed the automated OTT service distribution management system using the ODRL to solve these limitations and construct a system that can be practically applied to the digital content copyright trading market. Looking at the ecosystem of the current digital content copyright distribution management market, most copyright holders delegate their rights in copyright transactions through a trust management organization, so most copyright holders cannot check the copyright royalties for their works and the copyright royalty settlement and distribution ratio. Accordingly, the system proposed in this paper is based on chaincode in the Hyperledger Fabric environment to create an automated and active copyright distribution management system, and a number of people who have interests in each digital content are established. In order to guarantee the rights of joint copyright holders, a system was created to directly participate in the distribution of OTT services by signing, so that rights can be guaranteed. In addition, by calculating the copyright royalty based on the number of streams, all copyright holders can transparently check the copyright royalties, and by specifying the copyright royalties settlement and distribution ratio within ODRL, the copyright royalties are settled and distributed transparently and fairly.
Additionally, most systems proposed in previous studies do not consider features for users or consumers. Recognizing that not only creative copyright holders, but also users and consumers play a pivotal role in the vitality of the digital content market and OTT services, the system proposed in this paper includes functionalities catered to users and consumers. Typically, users or consumers provide their identity information for verification before registering to participate in OTT services and digital content copyright trading markets. However, a common concern is the provision of unnecessary personal information and the potential for privacy infringement if personal information is leaked by the service provider. In response, the proposed system utilizes zero-knowledge proof technology to minimize the direct exposure of personal information, thereby enhancing privacy protection. Furthermore, users and consumers, who pay a certain amount for OTT services, should be entitled to corresponding rights. Hence, the proposed system ensures that users and consumers receive services commensurate with the amount paid, based on a user rights verification feature built upon chaincode. This process actively follows the conditions specified within ODRL.
The system proposed in this paper significantly differs from most existing studies in its effort to safeguard the rights of joint copyright holders and to ensure rightful privileges for consumers and users. Additionally, it presents privacy protection as a major feature and advantage, aligning with the growing importance of personal information protection in contemporary contexts.
7. Discussion
The paper discusses how, in the OTT service market, illegal replication and distribution of digital video content are rampant due to issues like stream ripping, indiscriminate password sharing among users, credential fraud, fraudulent consumer endpoints, and CDN man-in-the-middle attacks, continuously infringing upon the rights that copyright holders should be guaranteed. Additionally, it confirms the ‘black box’ problem where, when copyright holders partially entrust the management of their digital content rights to agents like trust management organizations, there is a lack of transparency in tracking the usage history of digital content and in the settlement and distribution of copyright royalties.
To address these limitations, this paper proposes the Automated OTT Service Copyright Distribution Management System Using the ODRL, aimed at preventing the infringement of copyright holders’ rights arising from the increasing demand and diversity of digital content, and ensuring transparent and fair copyright royalty settlement and distribution.
The system presented in this paper automatically validates whether a consumer is eligible to use digital content, based on the restrictions defined in ODRL. It allows only authorized users to have limited access to the digital content. Additionally, considering the inherent characteristics of digital content and the presence of multiple co-copyright holders with vested interests, the system employs Threshold Schnorr Digital Signature to safeguard the rights of all copyright holders. This ensures that copyright transactions proceed only when there is unanimous agreement on the transaction terms among all holders. This method enables copyright holders to transparently monitor their share in copyright royalties, thereby ensuring their rights and facilitating a fair and transparent process for the settlement and distribution of these royalties.
However, besides the problems with unclear settlement and distribution of copyright royalties, there have recently been significant challenges related to joint copyright holders in digital content copyright transactions, resulting in legal disputes [38,39,40].
A joint work is recognized only if it meets two essential requirements. Firstly, the work must not allow for individual usage; this means joint copyright holders should exercise their intellectual property rights without violating the moral rights of their counterparts. Essentially, exercising copyright rights requires the unanimous agreement of all involved co-copyright holders. Secondly, the creation of such a work requires the collaborative effort of two or more individuals. Reflecting the nature of joint works, it is not possible for a single person to hold the copyright alone; it must involve at least two individuals, all of whom should have the clear intent to be joint copyright holders from the onset of the creation process.
However, the recent increase in legal disputes arising from joint copyright holders not adhering to such legal requirements has consistently led to calls for measures to ensure their rights. Yet, these discussions have mostly been confined to legal solutions.
The system in question leverages TSS technology to ensure the comprehensive protection of rights for joint copyright holders involved in particular digital content. This setup allows copyright transactions to proceed only with the unanimous consent of all copyright holders. This approach enables copyright holders to transparently monitor their share in the distribution of copyright royalties. Furthermore, the system automates this process, ensuring not just the protection of co-copyright holders’ rights but also the transparent and equitable settlement and distribution of copyright royalties. This innovation addresses and potentially resolves prevalent issues in the current OTT service market.
As analyzed in Section 6, the proposed system employing Threshold Schnorr Digital Signature was found to be more efficient in digital content distribution management when an agent composed of only two or three copyright holders participates. Specifically, it was observed that in such scenarios, agreement on contract terms from all copyright holders could be obtained in a shorter time compared to using the Schnorr Digital Signature. However, with digital content like movies or dramas on OTT services, the complexity of digital content production requires the involvement of various stakeholders, such as directors, writers, actors, and production companies. As a result, since most digital content cannot be created with only two or three copyright holders, there exists a limitation in efficiently managing transparent copyright distribution for digital content through the system using TSS.
Moreover, the process of conducting copyright transactions and contracts for digital content involves the transmission of sensitive data on the system. The exposure of such data could significantly raise the likelihood of disputes, either between companies or between companies and individuals. To mitigate this risk, the proposed system employs zero-knowledge proof technology, like zk-SNARKs and ZEC, to safeguard individual-identifying sensitive data, aiming to avert privacy infringement issues. However, while the necessity of a Trusted Third Party (TTP) during the initial setup for enhancing system efficiency is typically not a concern in general systems, it presents a unique challenge for the proposed system. This system is based on the private Blockchain platform Hyperledger Fabric, where employing a TTP during the initial setup could potentially compromise the Blockchain’s inherent feature of decentralization.
8. Conclusions
This paper introduces an automated OTT service copyright management system, leveraging ODRL and chaincode technology. The system is adept at automatically authenticating consumers’ rights to access digital content, while simultaneously considering the interests of joint copyright holders. It facilitates the transparent settlement and distribution of royalties, with a goal to protect the rights of copyright owners. When applied to the current OTT services and digital content markets, this system is anticipated to stimulate the digital content trade market and foster a trustworthy and reliable OTT service environment, enhancing its overall credibility.
Additionally, the proposed system, by utilizing TSS technology, ensures that the exercise of copyright-related transactions and contracts, such as intellectual property rights, is permitted only when all copyright holders agree to the terms. This is a significant advantage. However, as the number of joint copyright holders increases, the system encounters limitations in terms of efficiency. Furthermore, recognizing the potential for legal disputes due to sensitive data in digital content copyright transactions, the system employs zero-knowledge proof technology to reduce the likelihood of privacy breaches. Nonetheless, the reliance on trusted third parties in zero-knowledge proofs could potentially compromise the decentralization of the system’s foundational Hyperledger Fabric, presenting a challenge.
Due to the prevalence of multiple joint copyright holders in much of the digital content within the OTT service market, the currently proposed system encounters practical implementation challenges. To overcome these, future developments will aim to incorporate privacy enhancing technologies, which minimize privacy infringement risks while preserving the decentralized features of Blockchain technology. Furthermore, the system will be tailored to efficiently and logically ascertain the consent of numerous joint copyright holders. This strategy is intended to construct an OTT service copyright distribution management system that is feasible for real-world application in the OTT service market.
Author Contributions
W.S. designed the proposed system with Performance analysis and drafted this article. S.K. reviewed the article and provided inputs on functional analysis. S.O. revised this article. J.-H.L. revised this article and supervised all the work. All authors have read and agreed to the published version of the manuscript.
Funding
This work is supported by the Ministry of Culture, Sports and Tourism and Korea Creative Content Agency (Project Number: CR202104006) and by hte Institute of Information and communications Technology Planning and Evaluation (IITP) under the Metaverse Support Program to Nurture the Best Talents (IITP-2023-RS-2023-00254529) grant funded by the Korean government (MSIT).
Data Availability Statement
Data are contained within the article.
Conflicts of Interest
Author SungHeun Oh was employed by the company DigiCAP Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
References
- Kim, A.; Kim, M. A study on blockchain-based music distribution framework: Focusing on copyright protection. In Proceedings of the 2020 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Island, Republic of Korea, 21–23 October 2020; pp. 1921–1925. [Google Scholar]
- Lee, L. A Study on the Management Plan of Copyright Contracts Using Blockchain Technology: Blockchain-based Copyright Contracts Centered on Music Copyrights. Korea Serv. Manag. Soc. 2019, 23, 218–236. [Google Scholar]
- Kim, Y.; Park, B.; Kim, S.-Y. A selective encryption/decryption method of sensitive music usage history information on theme, background and signal music blockchain network. J. Web Eng. 2022, 21, 1265–1282. [Google Scholar] [CrossRef]
- Kim, Y.; Park, B.; Kim, S.-Y. A Usage History Information Generation and Inquiry Method for Theme, Background and Signal Music Based on Hyperledger Fabric. J. Mob. Multimed. 2022, 18, 1811–1828. [Google Scholar] [CrossRef]
- Top 15 Threats to Video Content Distribution Services. Available online: https://www.verimatrix.com/blog/top-15-threats-to-video-content-distribution-services (accessed on 20 December 2023).
- Hyperledger Fabric Structure. Available online: https://hcnam.tistory.com/19 (accessed on 20 December 2023).
- Cachin, C. Architecture of the hyperledger blockchain fabric. Workshop Distrib. Cryptocurrencies Consens. Ledgers 2016, 310, 4. [Google Scholar]
- A Blockchain Platform for the Enterprise Hyperledger Fabric. Available online: https://hyperledger-fabric.readthedocs.io/en/latest/index.html (accessed on 20 December 2023).
- Pelekoudas-Oikonomou, F.; Ribeiro, J.; Mantas, G.; Bashashi, F.; Sakellari, G.; Gonzalez, J. A tutorial on the implementation of a hyperledger fabric-based security architecture for IoMT. In Proceedings of the 2023 IFIP Networking Conference (IFIP Networking), Barcelona, Spain, 12–15 June 2023; pp. 1–6. [Google Scholar]
- Shammar, E.A.; Zahary, A.T.; AL-Shargabi, A.A. An attribute-based access control model for Internet of things using hyperledger fabric blockchain. Wirel. Commun. Mob. Comput. 2022, 2022, 6926408. [Google Scholar] [CrossRef]
- Pancari, S.; Rashid, A.; Zheng, J.; Patel, S.; Wang, Y.; Fu, J.A. Systematic Comparison between the Ethereum and Hyperledger Fabric Blockchain Platforms for Attribute-Based Access Control in Smart Home IoT Environments. Sensors 2023, 23, 7046. [Google Scholar] [PubMed]
- Al-Sumaidaee, G.; Alkhudary, R.; Zilic, Z.; Swidan, A. Performance analysis of a private blockchain network built on Hyperledger Fabric for healthcare. Inf. Process. Manag. 2023, 60, 103160. [Google Scholar] [CrossRef]
- Liang, X.; Zhao, Q.; Zhang, Y.; Liu, H.; Zhang, Q. EduChain: A highly available education consortium blockchain platform based on Hyperledger Fabric. Concurr. Comput. Pract. Exp. 2023, 35, e6330. [Google Scholar] [CrossRef]
- Kwon, S.; Park, J.; Lee, T.; Oh, S.; Lee, J.-H. Decentralized identifier based illegal digital content distribution tracking system using the format-preserving encryption algorithm. Softw. Pract. Exp. 2022. [Google Scholar] [CrossRef]
- Wang, S.; Yuan, Y.; Wang, X.; Li, J.; Qin, R.; Wang, F.Y. An overview of smart contract: Architecture, applications, and future trends. In Proceedings of the 2018 IEEE Intelligent Vehicles Symposium (IV), Changshu, China, 26–30 June 2018; pp. 108–113. [Google Scholar]
- Mohanta, B.K.; Panda, S.S.; Jena, D. An overview of smart contract and use cases in blockchain technology. In Proceedings of the 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru, India, 10–12 July 2018; pp. 1–4. [Google Scholar]
- Zou, W.; Lo, D.; Kochhar, P.S.; Le, X.B.D.; Xia, X.; Feng, Y.; Chen, Z.; Xu, B. Smart contract development: Challenges and opportunities. IEEE Trans. Softw. Eng. 2019, 47, 2084–2106. [Google Scholar] [CrossRef]
- Sharma, P.; Jindal, R.; Borah, M.D. A review of smart contract-based platforms, applications, and challenges. Clust. Comput. 2023, 26, 395–421. [Google Scholar] [CrossRef]
- Beckert, B.; Herda, M.; Kirsten, M.; Schiffl, J. Formal specification and verification of Hyperledger Fabric chaincode. In Proceedings of the 3rd Symposium on Distributed Ledger Technology (SDLT-2018) Co-Located with ICFEM, Gold Coast, Australia, 12 November 2018; pp. 44–48. [Google Scholar]
- Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y.; et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal, 23–26 April 2018; pp. 1–15. [Google Scholar]
- Foschini, L.; Gavagna, A.; Martuscelli, G.; Montanari, R. Hyperledger fabric blockchain: Chaincode performance analysis. In Proceedings of the ICC 2020 IEEE International Conference on Communications (ICC), Virtual, 7–11 June 2020; pp. 1–6. [Google Scholar]
- Son, S. Analysis of transaction flow and smart contract procedures of Ethereum and Hyperledger Fabric. In Proceedings of the Korea Communications Society Conference, Yongpyeong, Republic of Korea, 23–25 January 2019; pp. 205–206. [Google Scholar]
- ODRL Information Model 2. Available online: https://www.w3.org/TR/odrl-model (accessed on 23 August 2023).
- Mobility Data Share. Available online: https://www.pentasecurity.co.kr/mobility-data-sharing (accessed on 20 December 2023).
- Dam, T.; Krimbacher, A.; Neumaier, S. Policy Patterns for Usage Control in Data Spaces. arXiv 2023, arXiv:23011289. [Google Scholar]
- Roshankish, S.; Fornara, N. Exploration of norms and policies in digital fashion domain using semantic web technologies. In International Conference on Human-Computer Interaction; Springer International Publishing: Cham, Switzerland, 2021; pp. 384–395. [Google Scholar]
- Choi, C.-J.; Joe, Y.J.; Shin, D.-M. Design of a Blockchian-based KRW Transfer System for Settlement and Distribution of Digital Content Copyright Fees. J. Softw. Assess. Valuat. JSAV 2023, 19, 21–30. [Google Scholar]
- Zheng, X.; Su, J.; Si, Y.; Wang, B. Research on Short Video Copyright Transaction and Protection Mechanism Based on Blockchain NFT. In Proceedings of the 2022 7th International Conference on Modern Management and Education Technology (MMET 2022), Xiamen, China, 23–25 September 2022; pp. 574–581. [Google Scholar]
- Varaprasada, R.K.; Panda, S.K. A design model of copyright protection system based on distributed ledger technology. In Computer Communication, Networking and IoT: Proceedings of 5th ICICC 2021; Springer Nature: Singapore, 2022; pp. 127–141. [Google Scholar]
- Li, J.; Grintsvayg, A.; Kauffman, J.; Fleming, C. LBRY: A blockchain-based decentralized digital content marketplace. In Proceedings of the 2020 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), Oxford, UK, 3–6 August 2020; pp. 42–51. [Google Scholar]
- Kim, Y.; Park, B.; Jang, S.; Kim, S.Y. A Study on Copyright Usage Permission Platform Based on Blockchain for Distribution of Theme, Background and Signal Music. J. Semicond. Disp. Technol. 2021, 20, 18–24. [Google Scholar]
- Mukta, R.; Martens, J.; Paik, H.Y.; Lu, Q.; Kanhere, S.S. Blockchain-based verifiable credential sharing with selective disclosure. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020–1 January 2021; pp. 959–966. [Google Scholar]
- Maesa, D.D.F.; Lisi, A.; Mori, P.; Ricci, L.; Boschi, G. Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge. J. Netw. Comput. Appl. 2023, 212, 103577. [Google Scholar] [CrossRef]
- Kim, J.; Kim, G.; Ryou, J. DID Authentication Method for Secure Multi-Party Signature in Blockchain. J. Korean Inst. Commun. Inf. Sci. 2023, 48, 1368. [Google Scholar]
- Negre, C.; Plantard, T. Efficient regular modular exponentiation using multiplicative half-size splitting. J. Cryptogr. Eng. 2017, 7, 245–253. [Google Scholar] [CrossRef]
- Morita, H.; Schuldt, J.C.; Matsuda, T.; Hanaoka, G.; Iwata, T. On the security of the schnorr signature scheme and DSA against related-key attacks. In Proceedings of the Information Security and Cryptology—ICISC 2015: 18th International Conference, Seoul, Republic of Korea, 25–27 November 2015; pp. 25–27. [Google Scholar]
- Nyang, D.; Kwon, T. Efficient Threshold Schnorr’s Signature Scheme. J. Korea Inst. Inf. Secur. Cryptol. JKIISC 2004, 7, 69–74. [Google Scholar]
- Joint Authorship Does Not Require Writing Contribution. Available online: https://www.pinsentmasons.com/out-law/news/joint-authorship-does-not-require-writing-contribution (accessed on 21 December 2023).
- Principles of Joint Authorship. Available online: https://www.dacbeachcroft.com/en/gb/articles/2021/march/principles-of-joint-authorship (accessed on 21 December 2023).
- Lee, G. The study on Recent Issues Concerning Joint Works. Chung-Ang Law Assoc. 2021, 23, 113–156. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
